Skip to main content

Showing 1–50 of 287 results for author: Rahman, M M .

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.17852  [pdf, ps, other

    stat.ME cs.LG stat.AP stat.CO stat.ML

    Bayesian Inference for Left-Truncated Log-Logistic Distributions for Time-to-event Data Analysis

    Authors: Fahad Mostafa, Md Rejuan Haque, Md Mostafijur Rahman, Farzana Nasrin

    Abstract: Parameter estimation is a foundational step in statistical modeling, enabling us to extract knowledge from data and apply it effectively. Bayesian estimation of parameters incorporates prior beliefs with observed data to infer distribution parameters probabilistically and robustly. Moreover, it provides full posterior distributions, allowing uncertainty quantification and regularization, especiall… ▽ More

    Submitted 21 June, 2025; originally announced June 2025.

    Comments: 24 pages, 5 figures, 5 tables

    MSC Class: 62P10; 62P12; 62F15; 62N02

  2. arXiv:2506.17165  [pdf, ps, other

    eess.IV cs.AI cs.CV

    Proportional Sensitivity in Generative Adversarial Network (GAN)-Augmented Brain Tumor Classification Using Convolutional Neural Network

    Authors: Mahin Montasir Afif, Abdullah Al Noman, K. M. Tahsin Kabir, Md. Mortuza Ahmmed, Md. Mostafizur Rahman, Mufti Mahmud, Md. Ashraful Babu

    Abstract: Generative Adversarial Networks (GAN) have shown potential in expanding limited medical imaging datasets. This study explores how different ratios of GAN-generated and real brain tumor MRI images impact the performance of a CNN in classifying healthy vs. tumorous scans. A DCGAN was used to create synthetic images which were mixed with real ones at various ratios to train a custom CNN. The CNN was… ▽ More

    Submitted 20 June, 2025; originally announced June 2025.

    Comments: This papaer has been submitted to The 18th International Conference on Brain Informatics (BI'25), Italy

  3. arXiv:2506.14459  [pdf, ps, other

    cs.LG

    A Model-Mediated Stacked Ensemble Approach for Depression Prediction Among Professionals

    Authors: Md. Mortuza Ahmmed, Abdullah Al Noman, Mahin Montasir Afif, K. M. Tahsin Kabir, Md. Mostafizur Rahman, Mufti Mahmud

    Abstract: Depression is a significant mental health concern, particularly in professional environments where work-related stress, financial pressure, and lifestyle imbalances contribute to deteriorating well-being. Despite increasing awareness, researchers and practitioners face critical challenges in developing accurate and generalizable predictive models for mental health disorders. Traditional classifica… ▽ More

    Submitted 17 June, 2025; originally announced June 2025.

  4. arXiv:2506.07871  [pdf, ps, other

    cs.LG cs.SE

    Can Hessian-Based Insights Support Fault Diagnosis in Attention-based Models?

    Authors: Sigma Jahan, Mohammad Masudur Rahman

    Abstract: As attention-based deep learning models scale in size and complexity, diagnosing their faults becomes increasingly challenging. In this work, we conduct an empirical study to evaluate the potential of Hessian-based analysis for diagnosing faults in attention-based models. Specifically, we use Hessian-derived insights to identify fragile regions (via curvature analysis) and parameter interdependenc… ▽ More

    Submitted 9 June, 2025; originally announced June 2025.

  5. arXiv:2505.13643  [pdf, other

    cs.LG cs.CV

    FedCTTA: A Collaborative Approach to Continual Test-Time Adaptation in Federated Learning

    Authors: Rakibul Hasan Rajib, Md Akil Raihan Iftee, Mir Sazzat Hossain, A. K. M. Mahbubur Rahman, Sajib Mistry, M Ashraful Amin, Amin Ahsan Ali

    Abstract: Federated Learning (FL) enables collaborative model training across distributed clients without sharing raw data, making it ideal for privacy-sensitive applications. However, FL models often suffer performance degradation due to distribution shifts between training and deployment. Test-Time Adaptation (TTA) offers a promising solution by allowing models to adapt using only test samples. However, e… ▽ More

    Submitted 19 May, 2025; originally announced May 2025.

    Comments: 8 pages, 5 figures, Accepted In IJCNN 2025

  6. Optimizing DDoS Detection in SDNs Through Machine Learning Models

    Authors: Md. Ehsanul Haque, Amran Hossain, Md. Shafiqul Alam, Ahsan Habib Siam, Sayed Md Fazle Rabbi, Md. Muntasir Rahman

    Abstract: The emergence of Software-Defined Networking (SDN) has changed the network structure by separating the control plane from the data plane. However, this innovation has also increased susceptibility to DDoS attacks. Existing detection techniques are often ineffective due to data imbalance and accuracy issues; thus, a considerable research gap exists regarding DDoS detection methods suitable for SDN… ▽ More

    Submitted 14 May, 2025; originally announced May 2025.

    Comments: Published Paper of CICN2024

  7. arXiv:2505.07871  [pdf, ps, other

    cs.CL cs.AI

    Evaluating Financial Sentiment Analysis with Annotators Instruction Assisted Prompting: Enhancing Contextual Interpretation and Stock Prediction Accuracy

    Authors: A M Muntasir Rahman, Ajim Uddin, Guiling "Grace" Wang

    Abstract: Financial sentiment analysis (FSA) presents unique challenges to LLMs that surpass those in typical sentiment analysis due to the nuanced language used in financial contexts. The prowess of these models is often undermined by the inherent subjectivity of sentiment classifications in existing benchmark datasets like Financial Phrasebank. These datasets typically feature undefined sentiment classes… ▽ More

    Submitted 9 May, 2025; originally announced May 2025.

  8. arXiv:2504.21464  [pdf, ps, other

    cs.CV

    VR-FuseNet: A Fusion of Heterogeneous Fundus Data and Explainable Deep Network for Diabetic Retinopathy Classification

    Authors: Shamim Rahim Refat, Ziyan Shirin Raha, Shuvashis Sarker, Faika Fairuj Preotee, MD. Musfikur Rahman, Tashreef Muhammad, Mohammad Shafiul Alam

    Abstract: Diabetic retinopathy is a severe eye condition caused by diabetes where the retinal blood vessels get damaged and can lead to vision loss and blindness if not treated. Early and accurate detection is key to intervention and stopping the disease progressing. For addressing this disease properly, this paper presents a comprehensive approach for automated diabetic retinopathy detection by proposing a… ▽ More

    Submitted 21 June, 2025; v1 submitted 30 April, 2025; originally announced April 2025.

    Comments: 33 pages, 49 figures

  9. arXiv:2504.02195  [pdf, other

    cs.IR

    LLM-Augmented Graph Neural Recommenders: Integrating User Reviews

    Authors: Hiroki Kanezashi, Toyotaro Suzumura, Cade Reid, Md Mostafizur Rahman, Yu Hirate

    Abstract: Recommender systems increasingly aim to combine signals from both user reviews and purchase (or other interaction) behaviors. While user-written comments provide explicit insights about preferences, merging these textual representations from large language models (LLMs) with graph-based embeddings of user actions remains a challenging task. In this work, we propose a framework that employs both a… ▽ More

    Submitted 2 April, 2025; originally announced April 2025.

    Comments: Under Review

  10. arXiv:2503.18832  [pdf, other

    cs.SE

    Understanding the Impact of Domain Term Explanation on Duplicate Bug Report Detection

    Authors: Usmi Mukherjee, Mohammad Masudur Rahman

    Abstract: Duplicate bug reports make up 42% of all reports in bug tracking systems (e.g., Bugzilla), causing significant maintenance overhead. Hence, detecting and resolving duplicate bug reports is essential for effective issue management. Traditional techniques often focus on detecting textually similar duplicates. However, existing literature has shown that up to 23% of the duplicate bug reports are text… ▽ More

    Submitted 24 March, 2025; originally announced March 2025.

    Comments: Accepted at EASE 2025

  11. arXiv:2502.20667  [pdf, other

    cs.CV cs.AI cs.LG

    Advancing AI-Powered Medical Image Synthesis: Insights from MedVQA-GI Challenge Using CLIP, Fine-Tuned Stable Diffusion, and Dream-Booth + LoRA

    Authors: Ojonugwa Oluwafemi Ejiga Peter, Md Mahmudur Rahman, Fahmi Khalifa

    Abstract: The MEDVQA-GI challenge addresses the integration of AI-driven text-to-image generative models in medical diagnostics, aiming to enhance diagnostic capabilities through synthetic image generation. Existing methods primarily focus on static image analysis and lack the dynamic generation of medical imagery from textual descriptions. This study intends to partially close this gap by introducing a nov… ▽ More

    Submitted 27 February, 2025; originally announced February 2025.

  12. arXiv:2502.19341  [pdf, other

    cs.IT cs.CR eess.SP

    Unveiling Wireless Users' Locations via Modulation Classification-based Passive Attack

    Authors: Ali Hanif, Abdulrahman Katranji, Nour Kouzayha, Muhammad Mahboob Ur Rahman, Tareq Y. Al-Naffouri

    Abstract: The broadcast nature of the wireless medium and openness of wireless standards, e.g., 3GPP releases 16-20, invite adversaries to launch various active and passive attacks on cellular and other wireless networks. This work identifies one such loose end of wireless standards and presents a novel passive attack method enabling an eavesdropper (Eve) to localize a line of sight wireless user (Bob) who… ▽ More

    Submitted 26 February, 2025; originally announced February 2025.

    Comments: 7 pages, 4 figures, submitted to IEEE for possible publication

  13. arXiv:2502.18468  [pdf, other

    cs.SE cs.AI cs.CR

    SOK: Exploring Hallucinations and Security Risks in AI-Assisted Software Development with Insights for LLM Deployment

    Authors: Ariful Haque, Sunzida Siddique, Md. Mahfuzur Rahman, Ahmed Rafi Hasan, Laxmi Rani Das, Marufa Kamal, Tasnim Masura, Kishor Datta Gupta

    Abstract: The integration of Large Language Models (LLMs) such as GitHub Copilot, ChatGPT, Cursor AI, and Codeium AI into software development has revolutionized the coding landscape, offering significant productivity gains, automation, and enhanced debugging capabilities. These tools have proven invaluable for generating code snippets, refactoring existing code, and providing real-time support to developer… ▽ More

    Submitted 31 January, 2025; originally announced February 2025.

  14. A CNN Approach to Automated Detection and Classification of Brain Tumors

    Authors: Md. Zahid Hasan, Abdullah Tamim, D. M. Asadujjaman, Md. Mahfujur Rahman, Md. Abu Ahnaf Mollick, Nosin Anjum Dristi, Abdullah-Al-Noman

    Abstract: Brain tumors require an assessment to ensure timely diagnosis and effective patient treatment. Morphological factors such as size, location, texture, and variable appearance complicate tumor inspection. Medical imaging presents challenges, including noise and incomplete images. This research article presents a methodology for processing Magnetic Resonance Imaging (MRI) data, encompassing technique… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

    MSC Class: 68T07 ACM Class: J.3

  15. arXiv:2502.04566  [pdf, other

    cs.CV

    An Optimized YOLOv5 Based Approach For Real-time Vehicle Detection At Road Intersections Using Fisheye Cameras

    Authors: Md. Jahin Alam, Muhammad Zubair Hasan, Md Maisoon Rahman, Md Awsafur Rahman, Najibul Haque Sarker, Shariar Azad, Tasnim Nishat Islam, Bishmoy Paul, Tanvir Anjum, Barproda Halder, Shaikh Anowarul Fattah

    Abstract: Real time vehicle detection is a challenging task for urban traffic surveillance. Increase in urbanization leads to increase in accidents and traffic congestion in junction areas resulting in delayed travel time. In order to solve these problems, an intelligent system utilizing automatic detection and tracking system is significant. But this becomes a challenging task at road intersection areas wh… ▽ More

    Submitted 6 February, 2025; originally announced February 2025.

  16. arXiv:2501.14228  [pdf

    cs.CV cs.AI

    Detection and Classification of Acute Lymphoblastic Leukemia Utilizing Deep Transfer Learning

    Authors: Md. Abu Ahnaf Mollick, Md. Mahfujur Rahman, D. M. Asadujjaman, Abdullah Tamim, Nosin Anjum Dristi, Md. Takbir Hossen

    Abstract: A mutation in the DNA of a single cell that compromises its function initiates leukemia,leading to the overproduction of immature white blood cells that encroach upon the space required for the generation of healthy blood cells.Leukemia is treatable if identified in its initial stages. However,its diagnosis is both arduous and time consuming. This study proposes a novel approach for diagnosing leu… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

    Comments: 4 pages, 4 figures, Submitted to UCICS

    MSC Class: 68T07 ACM Class: J.3

  17. arXiv:2501.13713  [pdf

    cs.CV cs.AI

    Skin Disease Detection and Classification of Actinic Keratosis and Psoriasis Utilizing Deep Transfer Learning

    Authors: Fahud Ahmmed, Md. Zaheer Raihan, Kamnur Nahar, D. M. Asadujjaman, Md. Mahfujur Rahman, Abdullah Tamim

    Abstract: Skin diseases can arise from infections, allergies, genetic factors, autoimmune disorders, hormonal imbalances, or environmental triggers such as sun damage and pollution. Some skin diseases, such as Actinic Keratosis and Psoriasis, can be fatal if not treated in time. Early identification is crucial, but the diagnostic methods for these conditions are often expensive and not widely accessible. In… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

    MSC Class: 68T07 ACM Class: J.3

  18. arXiv:2501.12560  [pdf, other

    cs.SE

    Improved Detection and Diagnosis of Faults in Deep Neural Networks Using Hierarchical and Explainable Classification

    Authors: Sigma Jahan, Mehil B Shah, Parvez Mahbub, Mohammad Masudur Rahman

    Abstract: Deep Neural Networks (DNN) have found numerous applications in various domains, including fraud detection, medical diagnosis, facial recognition, and autonomous driving. However, DNN-based systems often suffer from reliability issues due to their inherent complexity and the stochastic nature of their underlying models. Unfortunately, existing techniques to detect faults in DNN programs are either… ▽ More

    Submitted 21 January, 2025; originally announced January 2025.

  19. arXiv:2501.12217  [pdf, other

    cs.CV cs.LG

    Early Detection and Classification of Breast Cancer Using Deep Learning Techniques

    Authors: Mst. Mumtahina Labonno, D. M. Asadujjaman, Md. Mahfujur Rahman, Abdullah Tamim, Mst. Jannatul Ferdous, Rafi Muttaki Mahi

    Abstract: Breast cancer is one of the deadliest cancers causing about massive number of patients to die annually all over the world according to the WHO. It is a kind of cancer that develops when the tissues of the breast grow rapidly and unboundly. This fatality rate can be prevented if the cancer is detected before it gets malignant. Using automation for early-age detection of breast cancer, Artificial In… ▽ More

    Submitted 21 January, 2025; originally announced January 2025.

    ACM Class: J.3

  20. arXiv:2501.10542  [pdf, other

    cs.SE cs.AI cs.CL

    Improved IR-based Bug Localization with Intelligent Relevance Feedback

    Authors: Asif Mohammed Samir, Mohammad Masudur Rahman

    Abstract: Software bugs pose a significant challenge during development and maintenance, and practitioners spend nearly 50% of their time dealing with bugs. Many existing techniques adopt Information Retrieval (IR) to localize a reported bug using textual and semantic relevance between bug reports and source code. However, they often struggle to bridge a critical gap between bug reports and code that requir… ▽ More

    Submitted 27 March, 2025; v1 submitted 17 January, 2025; originally announced January 2025.

    Comments: 13 pages, 5 figures

    ACM Class: F.2.2; I.2.7

  21. arXiv:2501.00940  [pdf, other

    cs.CR

    SPADE: Enhancing Adaptive Cyber Deception Strategies with Generative AI and Structured Prompt Engineering

    Authors: Shihab Ahmed, A B M Mohaimenur Rahman, Md Morshed Alam, Md Sajidul Islam Sajid

    Abstract: The rapid evolution of modern malware presents significant challenges to the development of effective defense mechanisms. Traditional cyber deception techniques often rely on static or manually configured parameters, limiting their adaptability to dynamic and sophisticated threats. This study leverages Generative AI (GenAI) models to automate the creation of adaptive cyber deception ploys, focusin… ▽ More

    Submitted 1 January, 2025; originally announced January 2025.

    Journal ref: 2025 IEEE 15th Annual Computing and Communication Workshop and Conference

  22. arXiv:2412.15237  [pdf

    cs.CR

    algoTRIC: Symmetric and asymmetric encryption algorithms for Cryptography -- A comparative analysis in AI era

    Authors: Naresh Kshetri, Mir Mehedi Rahman, Md Masud Rana, Omar Faruq Osama, James Hutson

    Abstract: The increasing integration of artificial intelligence (AI) within cybersecurity has necessitated stronger encryption methods to ensure data security. This paper presents a comparative analysis of symmetric (SE) and asymmetric encryption (AE) algorithms, focusing on their role in securing sensitive information in AI-driven environments. Through an in-depth study of various encryption algorithms suc… ▽ More

    Submitted 12 December, 2024; originally announced December 2024.

    Comments: 18 pages, 3 figures

  23. arXiv:2412.10995  [pdf, other

    cs.CV cs.AI

    RapidNet: Multi-Level Dilated Convolution Based Mobile Backbone

    Authors: Mustafa Munir, Md Mostafijur Rahman, Radu Marculescu

    Abstract: Vision transformers (ViTs) have dominated computer vision in recent years. However, ViTs are computationally expensive and not well suited for mobile devices; this led to the prevalence of convolutional neural network (CNN) and ViT-based hybrid models for mobile vision applications. Recently, Vision GNN (ViG) and CNN hybrid models have also been proposed for mobile vision tasks. However, all of th… ▽ More

    Submitted 14 December, 2024; originally announced December 2024.

    Comments: Accepted in 2025 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV 2025)

  24. arXiv:2411.18007  [pdf

    cs.CV

    AI-Driven Smartphone Solution for Digitizing Rapid Diagnostic Test Kits and Enhancing Accessibility for the Visually Impaired

    Authors: R. B. Dastagir, J. T. Jami, S. Chanda, F. Hafiz, M. Rahman, K. Dey, M. M. Rahman, M. Qureshi, M. M. Chowdhury

    Abstract: Rapid diagnostic tests are crucial for timely disease detection and management, yet accurate interpretation of test results remains challenging. In this study, we propose a novel approach to enhance the accuracy and reliability of rapid diagnostic test result interpretation by integrating artificial intelligence (AI) algorithms, including convolutional neural networks (CNN), within a smartphone-ba… ▽ More

    Submitted 26 November, 2024; originally announced November 2024.

  25. arXiv:2411.12748  [pdf, ps, other

    q-fin.TR cs.LG

    FinBERT-BiLSTM: A Deep Learning Model for Predicting Volatile Cryptocurrency Market Prices Using Market Sentiment Dynamics

    Authors: Mabsur Fatin Bin Hossain, Lubna Zahan Lamia, Md Mahmudur Rahman, Md Mosaddek Khan

    Abstract: Time series forecasting is a key tool in financial markets, helping to predict asset prices and guide investment decisions. In highly volatile markets, such as cryptocurrencies like Bitcoin (BTC) and Ethereum (ETH), forecasting becomes more difficult due to extreme price fluctuations driven by market sentiment, technological changes, and regulatory shifts. Traditionally, forecasting relied on stat… ▽ More

    Submitted 2 November, 2024; originally announced November 2024.

  26. arXiv:2411.12137  [pdf, other

    cs.SE

    Towards Understanding the Impact of Data Bugs on Deep Learning Models in Software Engineering

    Authors: Mehil B Shah, Mohammad Masudur Rahman, Foutse Khomh

    Abstract: Deep learning (DL) techniques have achieved significant success in various software engineering tasks (e.g., code completion by Copilot). However, DL systems are prone to bugs from many sources, including training data. Existing literature suggests that bugs in training data are highly prevalent, but little research has focused on understanding their impacts on the models used in software engineer… ▽ More

    Submitted 14 May, 2025; v1 submitted 18 November, 2024; originally announced November 2024.

    Comments: Under Major Revision at the Empirical Software Engineering Journal

  27. arXiv:2411.10954  [pdf, other

    cs.CL

    Dialectal Toxicity Detection: Evaluating LLM-as-a-Judge Consistency Across Language Varieties

    Authors: Fahim Faisal, Md Mushfiqur Rahman, Antonios Anastasopoulos

    Abstract: There has been little systematic study on how dialectal differences affect toxicity detection by modern LLMs. Furthermore, although using LLMs as evaluators ("LLM-as-a-judge") is a growing research area, their sensitivity to dialectal nuances is still underexplored and requires more focused attention. In this paper, we address these gaps through a comprehensive toxicity evaluation of LLMs across d… ▽ More

    Submitted 16 November, 2024; originally announced November 2024.

  28. arXiv:2410.20664   

    cs.CR cs.AI

    Embedding with Large Language Models for Classification of HIPAA Safeguard Compliance Rules

    Authors: Md Abdur Rahman, Md Abdul Barek, ABM Kamrul Islam Riad, Md Mostafizur Rahman, Md Bajlur Rashid, Smita Ambedkar, Md Raihan Miaa, Fan Wu, Alfredo Cuzzocrea, Sheikh Iqbal Ahamed

    Abstract: Although software developers of mHealth apps are responsible for protecting patient data and adhering to strict privacy and security requirements, many of them lack awareness of HIPAA regulations and struggle to distinguish between HIPAA rules categories. Therefore, providing guidance of HIPAA rules patterns classification is essential for developing secured applications for Google Play Store. In… ▽ More

    Submitted 7 November, 2024; v1 submitted 27 October, 2024; originally announced October 2024.

    Comments: I am requesting the withdrawal of my paper due to critical issues identified in the methodology/results that may impact its accuracy and reliability. I also plan to make substantial revisions that go beyond minor corrections

  29. arXiv:2410.18921  [pdf, other

    cs.CL cs.AI cs.LO

    From Blind Solvers to Logical Thinkers: Benchmarking LLMs' Logical Integrity on Faulty Mathematical Problems

    Authors: A M Muntasir Rahman, Junyi Ye, Wei Yao, Sierra S. Liu, Jesse Yu, Jonathan Yu, Wenpeng Yin, Guiling Wang

    Abstract: Consider the math problem: "Lily received 3 cookies from her best friend yesterday and ate 5 for breakfast. Today, her friend gave her 3 more cookies. How many cookies does Lily have now?" Many large language models (LLMs) in previous research approach this problem by calculating the answer "1" using the equation "3 - 5 + 3." However, from a human perspective, we recognize the inherent flaw in thi… ▽ More

    Submitted 4 April, 2025; v1 submitted 24 October, 2024; originally announced October 2024.

  30. arXiv:2410.15194  [pdf

    cs.CR

    FSCsec: Collaboration in Financial Sector Cybersecurity -- Exploring the Impact of Resource Sharing on IT Security

    Authors: Sayed Abu Sayeed, Mir Mehedi Rahman, Samiul Alam, Naresh Kshetri

    Abstract: The financial sector's dependence on digital infrastructure increases its vulnerability to cybersecurity threats, requiring strong IT security protocols with other entities. This collaboration, however, is often identified as the most vulnerable link in the chain of cybersecurity. Adopting both symbolic and substantive measures lessens the impact of IT security spending on decreasing the frequency… ▽ More

    Submitted 19 October, 2024; originally announced October 2024.

    Comments: 8 pages, 2 figures

  31. arXiv:2410.15017  [pdf, other

    cs.CL cs.AI cs.SD eess.AS

    DM-Codec: Distilling Multimodal Representations for Speech Tokenization

    Authors: Md Mubtasim Ahasan, Md Fahim, Tasnim Mohiuddin, A K M Mahbubur Rahman, Aman Chadha, Tariq Iqbal, M Ashraful Amin, Md Mofijul Islam, Amin Ahsan Ali

    Abstract: Recent advancements in speech-language models have yielded significant improvements in speech tokenization and synthesis. However, effectively mapping the complex, multidimensional attributes of speech into discrete tokens remains challenging. This process demands acoustic, semantic, and contextual information for precise speech representations. Existing speech representations generally fall into… ▽ More

    Submitted 19 October, 2024; originally announced October 2024.

  32. arXiv:2410.03105  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    Mamba in Vision: A Comprehensive Survey of Techniques and Applications

    Authors: Md Maklachur Rahman, Abdullah Aman Tutul, Ankur Nath, Lamyanba Laishram, Soon Ki Jung, Tracy Hammond

    Abstract: Mamba is emerging as a novel approach to overcome the challenges faced by Convolutional Neural Networks (CNNs) and Vision Transformers (ViTs) in computer vision. While CNNs excel at extracting local features, they often struggle to capture long-range dependencies without complex architectural modifications. In contrast, ViTs effectively model global relationships but suffer from high computational… ▽ More

    Submitted 3 October, 2024; originally announced October 2024.

    Comments: Under Review

  33. arXiv:2410.01750  [pdf

    cs.CR

    AssessITS: Integrating procedural guidelines and practical evaluation metrics for organizational IT and Cybersecurity risk assessment

    Authors: Mir Mehedi Rahman, Naresh Kshetri, Sayed Abu Sayeed, Md Masud Rana

    Abstract: In today's digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces 'AssessITS', an actionable method designed to provide organizations with comprehensive guidelines for conducting IT and cybersecurity risk assessments. Drawing extensively from NIST 800-30 Rev 1, COBIT 5,… ▽ More

    Submitted 2 October, 2024; originally announced October 2024.

    Comments: 25 pages, 8 figures, 7 tables

  34. arXiv:2409.19922  [pdf, other

    cs.SE

    Benchmarking ChatGPT, Codeium, and GitHub Copilot: A Comparative Study of AI-Driven Programming and Debugging Assistants

    Authors: Md Sultanul Islam Ovi, Nafisa Anjum, Tasmina Haque Bithe, Md. Mahabubur Rahman, Mst. Shahnaj Akter Smrity

    Abstract: With the increasing adoption of AI-driven tools in software development, large language models (LLMs) have become essential for tasks like code generation, bug fixing, and optimization. Tools like ChatGPT, GitHub Copilot, and Codeium provide valuable assistance in solving programming challenges, yet their effectiveness remains underexplored. This paper presents a comparative study of ChatGPT, Code… ▽ More

    Submitted 29 September, 2024; originally announced September 2024.

  35. arXiv:2409.09504  [pdf, other

    cs.CL

    Uddessho: An Extensive Benchmark Dataset for Multimodal Author Intent Classification in Low-Resource Bangla Language

    Authors: Fatema Tuj Johora Faria, Mukaffi Bin Moin, Md. Mahfuzur Rahman, Md Morshed Alam Shanto, Asif Iftekher Fahim, Md. Moinul Hoque

    Abstract: With the increasing popularity of daily information sharing and acquisition on the Internet, this paper introduces an innovative approach for intent classification in Bangla language, focusing on social media posts where individuals share their thoughts and opinions. The proposed method leverages multimodal data with particular emphasis on authorship identification, aiming to understand the underl… ▽ More

    Submitted 14 September, 2024; originally announced September 2024.

    Comments: Accepted for publication in "18th International Conference on Information Technology and Applications (ICITA 2024)"

  36. arXiv:2409.06206  [pdf, other

    cs.CV

    AgileIR: Memory-Efficient Group Shifted Windows Attention for Agile Image Restoration

    Authors: Hongyi Cai, Mohammad Mahdinur Rahman, Mohammad Shahid Akhtar, Jie Li, Jingyu Wu, Zhili Fang

    Abstract: Image Transformers show a magnificent success in Image Restoration tasks. Nevertheless, most of transformer-based models are strictly bounded by exorbitant memory occupancy. Our goal is to reduce the memory consumption of Swin Transformer and at the same time speed up the model during training process. Thus, we introduce AgileIR, group shifted attention mechanism along with window attention, which… ▽ More

    Submitted 10 September, 2024; originally announced September 2024.

  37. arXiv:2409.04651  [pdf, other

    cs.SE

    Introducing Ensemble Machine Learning Algorithms for Automatic Test Case Generation using Learning Based Testing

    Authors: Sheikh Md. Mushfiqur Rahman, Nasir U. Eisty

    Abstract: Ensemble methods are powerful machine learning algorithms that combine multiple models to enhance prediction capabilities and reduce generalization errors. However, their potential to generate effective test cases for fault detection in a System Under Test (SUT) has not been extensively explored. This study aims to systematically investigate the combination of ensemble methods and base classifiers… ▽ More

    Submitted 6 September, 2024; originally announced September 2024.

  38. arXiv:2409.03957  [pdf, other

    cs.SE

    On the Prevalence, Evolution, and Impact of Code Smells in Simulation Modelling Software

    Authors: Riasat Mahbub, Mohammad Masudur Rahman, Muhammad Ahsanul Habib

    Abstract: Simulation modelling systems are routinely used to test or understand real-world scenarios in a controlled setting. They have found numerous applications in scientific research, engineering, and industrial operations. Due to their complex nature, the simulation systems could suffer from various code quality issues and technical debt. However, to date, there has not been any investigation into thei… ▽ More

    Submitted 5 September, 2024; originally announced September 2024.

    Comments: The 24th IEEE International Conference on Source Code Analysis and Manipulation (SCAM 2024)

  39. arXiv:2409.03245  [pdf, other

    cs.CV

    UAV (Unmanned Aerial Vehicles): Diverse Applications of UAV Datasets in Segmentation, Classification, Detection, and Tracking

    Authors: Md. Mahfuzur Rahman, Sunzida Siddique, Marufa Kamal, Rakib Hossain Rifat, Kishor Datta Gupta

    Abstract: Unmanned Aerial Vehicles (UAVs), have greatly revolutionized the process of gathering and analyzing data in diverse research domains, providing unmatched adaptability and effectiveness. This paper presents a thorough examination of Unmanned Aerial Vehicle (UAV) datasets, emphasizing their wide range of applications and progress. UAV datasets consist of various types of data, such as satellite imag… ▽ More

    Submitted 5 September, 2024; originally announced September 2024.

  40. arXiv:2408.09005  [pdf

    cs.CV

    Comparative Performance Analysis of Transformer-Based Pre-Trained Models for Detecting Keratoconus Disease

    Authors: Nayeem Ahmed, Md Maruf Rahman, Md Fatin Ishrak, Md Imran Kabir Joy, Md Sanowar Hossain Sabuj, Md. Sadekur Rahman

    Abstract: This study compares eight pre-trained CNNs for diagnosing keratoconus, a degenerative eye disease. A carefully selected dataset of keratoconus, normal, and suspicious cases was used. The models tested include DenseNet121, EfficientNetB0, InceptionResNetV2, InceptionV3, MobileNetV2, ResNet50, VGG16, and VGG19. To maximize model training, bad sample removal, resizing, rescaling, and augmentation wer… ▽ More

    Submitted 16 August, 2024; originally announced August 2024.

    Comments: 14 pages, 3 tables, 27 figures

    ACM Class: I.4.m

  41. arXiv:2408.08261  [pdf, other

    cs.CL

    mhGPT: A Lightweight Generative Pre-Trained Transformer for Mental Health Text Analysis

    Authors: Dae-young Kim, Rebecca Hwa, Muhammad Mahbubur Rahman

    Abstract: This paper introduces mhGPT, a lightweight generative pre-trained transformer trained on mental health-related social media and PubMed articles. Fine-tuned for specific mental health tasks, mhGPT was evaluated under limited hardware constraints and compared with state-of-the-art models like MentaLLaMA and Gemma. Despite having only 1.98 billion parameters and using just 5% of the dataset, mhGPT ou… ▽ More

    Submitted 15 August, 2024; originally announced August 2024.

  42. arXiv:2407.14671  [pdf

    cs.CR

    DefTesPY: Cyber defense model with enhanced data modeling and analysis for Tesla company via Python Language

    Authors: Naresh Kshetri, Irin Sultana, Mir Mehedi Rahman, Darshana Shah

    Abstract: Several types of cyber-attacks on automobiles and business firms keep on rising as we are preparing to counter cybercrimes with several new technologies and defense models. Cyber defense (also, counter intelligence) is a computer network defense mechanism that involves response to activities, critical infrastructure protection, and information assurance for corporations, government bodies, and oth… ▽ More

    Submitted 19 July, 2024; originally announced July 2024.

    Comments: 11 pages, 4 figures

  43. arXiv:2407.13742  [pdf, other

    cs.CR cs.AI cs.IR

    CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications

    Authors: Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino

    Abstract: In recent years, there has been a growing focus on scrutinizing the security of cellular networks, often attributing security vulnerabilities to issues in the underlying protocol design descriptions. These protocol design specifications, typically extensive documents that are thousands of pages long, can harbor inaccuracies, underspecifications, implicit assumptions, and internal inconsistencies.… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

    Comments: Accepted at USENIX Security 24

  44. arXiv:2407.09187  [pdf

    cs.CL cs.AI

    Enhancing Depressive Post Detection in Bangla: A Comparative Study of TF-IDF, BERT and FastText Embeddings

    Authors: Saad Ahmed Sazan, Mahdi H. Miraz, A B M Muntasir Rahman

    Abstract: Due to massive adoption of social media, detection of users' depression through social media analytics bears significant importance, particularly for underrepresented languages, such as Bangla. This study introduces a well-grounded approach to identify depressive social media posts in Bangla, by employing advanced natural language processing techniques. The dataset used in this work, annotated by… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

  45. arXiv:2407.04831  [pdf, other

    cs.AI cs.SE

    Code Hallucination

    Authors: Mirza Masfiqur Rahman, Ashish Kundu

    Abstract: Generative models such as large language models are extensively used as code copilots and for whole program generation. However, the programs they generate often have questionable correctness, authenticity and reliability in terms of integration as they might not follow the user requirements, provide incorrect and/or nonsensical outputs, or even contain semantic/syntactic errors - overall known as… ▽ More

    Submitted 7 August, 2024; v1 submitted 5 July, 2024; originally announced July 2024.

  46. arXiv:2406.10708  [pdf, other

    cs.CV cs.DB eess.SP

    MMVR: Millimeter-wave Multi-View Radar Dataset and Benchmark for Indoor Perception

    Authors: M. Mahbubur Rahman, Ryoma Yataka, Sorachi Kato, Pu Perry Wang, Peizhao Li, Adriano Cardace, Petros Boufounos

    Abstract: Compared with an extensive list of automotive radar datasets that support autonomous driving, indoor radar datasets are scarce at a smaller scale in the format of low-resolution radar point clouds and usually under an open-space single-room setting. In this paper, we scale up indoor radar data collection using multi-view high-resolution radar heatmap in a multi-day, multi-room, and multi-subject s… ▽ More

    Submitted 17 July, 2024; v1 submitted 15 June, 2024; originally announced June 2024.

    Comments: 26 pages, 25 figures, 10 tables; See https://doi.org/10.5281/zenodo.12611978 to access the MMVR dataset

  47. arXiv:2406.08534  [pdf, ps, other

    cs.NE cs.AI

    Optimizing Container Loading and Unloading through Dual-Cycling and Dockyard Rehandle Reduction Using a Hybrid Genetic Algorithm

    Authors: Md. Mahfuzur Rahman, Md Abrar Jahin, Md. Saiful Islam, M. F. Mridha

    Abstract: This paper addresses the optimization of container unloading and loading operations at ports, integrating quay-crane dual-cycling with dockyard rehandle minimization. We present a unified model encompassing both operations: ship container unloading and loading by quay crane, and the other is reducing dockyard rehandles while loading the ship. We recognize that optimizing one aspect in isolation ca… ▽ More

    Submitted 4 December, 2024; v1 submitted 12 June, 2024; originally announced June 2024.

  48. arXiv:2406.05151  [pdf

    cs.CR

    CredSec: A Blockchain-based Secure Credential Management System for University Adoption

    Authors: Md. Ahsan Habib, Md. Mostafijur Rahman, Nieb Hasan Neom

    Abstract: University education play a critical role in shaping intellectual and professional development of the individuals and contribute significantly to the advancement of knowledge and society. Generally, university authority has a direct control of students result making and stores the credential in their local dedicated server. So, there is chance to alter the credential and also have a very high poss… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: 10 pages, 7 figures, 3 tables

  49. RoBERTa-BiLSTM: A Context-Aware Hybrid Model for Sentiment Analysis

    Authors: Md. Mostafizer Rahman, Ariful Islam Shiplu, Yutaka Watanobe, Md. Ashad Alam

    Abstract: Effectively analyzing the comments to uncover latent intentions holds immense value in making strategic decisions across various domains. However, several challenges hinder the process of sentiment analysis including the lexical diversity exhibited in comments, the presence of long dependencies within the text, encountering unknown symbols and words, and dealing with imbalanced datasets. Moreover,… ▽ More

    Submitted 14 May, 2025; v1 submitted 1 June, 2024; originally announced June 2024.

  50. arXiv:2405.16740  [pdf, other

    cs.CV

    PP-SAM: Perturbed Prompts for Robust Adaptation of Segment Anything Model for Polyp Segmentation

    Authors: Md Mostafijur Rahman, Mustafa Munir, Debesh Jha, Ulas Bagci, Radu Marculescu

    Abstract: The Segment Anything Model (SAM), originally designed for general-purpose segmentation tasks, has been used recently for polyp segmentation. Nonetheless, fine-tuning SAM with data from new imaging centers or clinics poses significant challenges. This is because this necessitates the creation of an expensive and time-intensive annotated dataset, along with the potential for variability in user prom… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

    Comments: 7 pages, 9 figures, Proceedings of the 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops